The SCEAS System
Navigation Menu

Search the dblp DataBase


Yong Feng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong Feng, Yan-yuan Zhang, Rui-yong Jia
    SnapChain: A Shared Snapshot Method for Data Version Management. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:264-269 [Conf]
  2. Mukesh Dalal, Yong Feng
    Anytime Temporal Reasoning: Preliminary Report (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CP, 1996, pp:535-536 [Conf]
  3. Fengling Han, Jiankun Hu, Xinhuo Yu, Yong Feng, Jie Zhou
    A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications. [Citation Graph (0, 0)][DBLP]
    ICB, 2006, pp:675-681 [Conf]
  4. Jiwei Xue, Yaohui Li, Yong Feng, Zhong Liu
    An Intelligent Hybrid Algorithm for Solving Non-linear Polynomial Systems. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:26-33 [Conf]
  5. Fengling Han, Xinghuo Yu, Yong Feng, Huifeng Dong
    Phase-to-Phase Wave Parameters Measurement of Distribution Lines Based on BP Networks. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2002, pp:284-292 [Conf]
  6. Fengling Han, Xinghuo Yu, Guanrong Chen, Wenbo Liu, Yong Feng
    Generation of multi-scroll chaos using second-order linear systems with hysteresis. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2003, pp:84-87 [Conf]
  7. Yong Feng, Xinghuo Yu, Zhihong Man
    Non-singular terminal sliding mode control and its application for robot manipulators. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2001, pp:545-548 [Conf]
  8. Yong Feng, Kaigui Wu, Zhongfu Wu, Zhongyang Xiong
    Intrusion Detection Based on Dynamic Self-organizing Map Neural Network Clustering. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2005, pp:428-433 [Conf]
  9. Jiang Zhong, Chun Xiao Ye, Yong Feng, Ying Zhou, Zhong Fu Wu
    Neuron Selection for RBF Neural Network Classifier Based on Multiple Granularities Immune Network. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:866-872 [Conf]
  10. Mukesh Dalal, Steven Feiner, Kathleen McKeown, Shimei Pan, Michelle X. Zhou, Tobias Höllerer, James Shaw, Yong Feng, Jeanne Fromer
    Negotiation for Automated Generation of Temporal Multimedia Presentations. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1996, pp:55-64 [Conf]
  11. Yong Feng, Yan-yuan Zhang, Rui-yong Jia
    Research and Implementation of a Snapshot Facility Suitable for Soft-Failure Recovery. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:256-260 [Conf]
  12. Yong Feng, Yan-yuan Zhang, Rui-yong Jia, Xiao Zhang
    Online Virtual Disk Migration with Performance Guarantees in a Shared Storage Environment. [Citation Graph (0, 0)][DBLP]
    PaCT, 2005, pp:226-238 [Conf]
  13. Wu Liu, Hai-Xin Duan, Yong Feng, Yong-Bin Li, Ping Ren
    Improved algorithms tracing back to attacking sources. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2004, pp:222-226 [Conf]
  14. Rui-yong Jia, Yan-yuan Zhang, Yong Feng, Zhong-hua Li
    Adding Multiple Paths Capabilities in a User-Level Shared-Disk File System. [Citation Graph (0, 0)][DBLP]
    SNPD, 2004, pp:366-372 [Conf]
  15. Zhi-Ping Fan, Yong Feng, Yong-Hong Sun, Bo Feng, Tian-hui You
    A Framework on Compound Knowledge Push System Oriented to Organizational Employees. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:622-630 [Conf]
  16. Yong Feng, Yan-yuan Zhang, Rui-yong Jia
    EPYFQ: a novel scheduling algorithm for performance virtualization in shared storage environment. [Citation Graph (0, 0)][DBLP]
    WOSP, 2005, pp:263-264 [Conf]
  17. Yong Feng, Yan-yuan Zhang
    Virtual Disk Reconfiguration with Performance Guarantees in Shared Storage Environment. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:69-74 [Conf]
  18. Yong Feng, Yan-yuan Zhang
    E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage Environment. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:81-84 [Conf]
  19. Rui-yong Jia, Yan-yuan Zhang, Yong Feng
    GCSLight: A Light-Weight Group Communication Service for Metadata Server Cluster. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:93-96 [Conf]
  20. Feng Huang, Yong Feng
    An Image Encryption Approach Based on a New Two-Dimensional Map. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:125-130 [Conf]
  21. Yong Feng, Yaohui Li
    Checking RSC Criteria for Extended Dixon Resultant by Interpolation Method. [Citation Graph (0, 0)][DBLP]
    SYNASC, 2005, pp:48-51 [Conf]
  22. Yong Feng, Lei Liu, Jin-Ti Wang, Hao Huang, Qing-Xiang Guo
    Assessment of Experimental Bond Dissociation Energies Using Composite ab Initio Methods and Evaluation of the Performances of Density Functional Methods in the Calculation of Bond Dissociation Energies. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 2003, v:43, n:6, pp:2005-2013 [Journal]
  23. Yong Feng, Jiang Zhong, Zhongyang Xiong, Chun Xiao Ye, Kaigui Wu
    Network Anomaly Detection Based on DSOM and ACO Clustering. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2007, pp:947-955 [Conf]
  24. Zhiguo Li, Jiang Zhong, Yong Feng, Zhong Fu Wu
    An Adaptive Classifier Based on Artificial Immune Network. [Citation Graph (0, 0)][DBLP]
    LSMS (2), 2007, pp:422-428 [Conf]

  25. Dynamic Integrity Measurement Model Based on Trusted Computing. [Citation Graph (, )][DBLP]

  26. Based on Parameter Optimization and FLC Nonsingular Terminal Sliding Mode Controller of a Two-Link Flexible Manipulator. [Citation Graph (, )][DBLP]

  27. An Enhanced Swarm Intelligence Clustering-Based RBF Neural Network Detection Classifier. [Citation Graph (, )][DBLP]

  28. An Enhanced Swarm Intelligence Clustering-Based RBF Neural Network Web Text Classifier. [Citation Graph (, )][DBLP]

  29. Intrusion Detection Based on Density Level Sets Estimation. [Citation Graph (, )][DBLP]

  30. Revocation in an Attribute-Based Delegation Model. [Citation Graph (, )][DBLP]

  31. A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6. [Citation Graph (, )][DBLP]

  32. Chaos Synchronization Using A Robust Sliding Mode Observer By Transmitting A Scalar Signal. [Citation Graph (, )][DBLP]

  33. An Improved Image Encryption Scheme Based on Line Maps. [Citation Graph (, )][DBLP]

  34. Research on the Construction of Customer-centered Integrative Knowledge Push System. [Citation Graph (, )][DBLP]

  35. Structural Simplification of a Fuzzy-Neural Network Model. [Citation Graph (, )][DBLP]

  36. A Novel Multicast Key Exchange Algorithm Based on Extended Chebyshev Map. [Citation Graph (, )][DBLP]

  37. Research on the Construction of E-learning System Meeting Post Knowledge Demand. [Citation Graph (, )][DBLP]

  38. PKI Mesh Trust Model Based on Trusted Computing. [Citation Graph (, )][DBLP]

  39. An Improved Method for Computing Dixon Polynomial. [Citation Graph (, )][DBLP]

  40. An Intelligent Recommendation Method of E-Commerce Based on Ontology. [Citation Graph (, )][DBLP]

  41. Obtaining Exact Interpolation Multivariate Polynomial by Approximation [Citation Graph (, )][DBLP]

  42. Finding Exact Minimal Polynomial by Approximations [Citation Graph (, )][DBLP]

  43. A complete algorithm to find exact minimal polynomial by approximations [Citation Graph (, )][DBLP]

  44. Parallel computation of real solving bivariate polynomial systems by zero-matching method [Citation Graph (, )][DBLP]

  45. Exact Bivariate Polynomial Factorization in Q by Approximation of Roots [Citation Graph (, )][DBLP]

Search in 0.007secs, Finished in 0.010secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002